In 1976, Whitfield Diffie and Martin Hellman demonstrated how public key cryptography could enable secure information exchange between parties that do not share secrets. In order for public key cryptography to work in modern distributed...

Access control is a core component of any information-security strategy. Researchers have spent tremendous energy over the past forty years defining abstract access-control models and proving various properties about them. However, surprisingly...

The Internet has become a virtual place where people not only operate in isolation but also interact with other Internet users. Collaborative systems are becoming more popular. Applications now being introduced could provide better remote education...

A mesh network is a network of wireless routers that employ multi-hop routing and can be used to provide network access for mobile clients. Mobile mesh networks can be deployed rapidly to provide an alternate communication infrastructure for...

Many alkaloids of biological importance have the 11H-pyrido (4,3,2-mn) acridine ring structure such as cystodytin and amphimedine. It would be desirable to find an effective way to synthesize a wide variety of these compounds using a single...

Sponges are a historically ambiguous taxon, often considered primitively simple representatives of early Metazoa, living fossils from the era before the complex morphological features of the bilaterian phyla appeared in the Cambrian. Yet recent...

Recent technological advances have fostered the emergence of Wireless Sensor Networks (WSNs), which consist of tiny, wireless, battery-powered nodes that are expected to revolutionize the ways in which we understand and construct complex physical...

IL-1β is a potent proinflammatory cytokine produced in response to Pseudomonas aeruginosa infection. While it is appreciated that IL-1β is a critical modulator of the host response to P. aeruginosa infection, the host and bacterial determinants...

The Border Gateway Protocol (BGP) that manages inter-domain routing on the Internet lacks security. Protective measures using public key cryptography introduce complexities and costs. To support authentication and other security functionality in...

Our aim is to enhance high-throughput applications of Nuclear Magnetic Resonance (NMR) through the development of efficient computational methods that operate on sparse (minimal) sets of experimental NMR data. We have developed a family of four...

Eating disorders are a persistent problem for women on college campuses across the country, and peer education programs are one method that colleges have employed to address these concerns. A previous study found that peer education is actually...

Colloidal nanoparticles are particles with sizes ranging from one nanometer to several hundred nanometers, which disperse evenly in a dispersion medium. In aqueous solutions, amphiphilic molecules organize themselves to form such colloidal systems...

A secure system that cannot be used by real users to secure real-world processes is not really secure at all. While many believe that usability and security are diametrically opposed, a growing body of research from the field of Human-Computer...

Automated trust negotiation is a new approach to access control and authentication for the open systems such as the Internet, where sensitive interactions sometimes occur among entities with no prior knowledge of each other. Trust negotiation...

Protein complexes play vital roles in the fundamental processes of life. In particular, homo-oligomers are involved in cell signaling, regulation, and transport. To make detailed studies of these symmetric proteins, they need to be discovered, and...